An information processing apparatus includes a first port, a second port, a storage device, and a determining unit. The first port is to be connected to a first network having a first security level. The second port is to be connected to a second network having a second security level. The second security level is lower than the first security level. The storage device holds first setting information for connection to the first network and second setting information for connection to the second network. The determining unit makes network connection to at least the first port in accordance with the second setting information and determines, on the basis of a result from the network connection to at least the first port in accordance with the second setting information, whether the network connection to the first port is made properly.
|
9. A network connection determining method in an information processing apparatus that includes a first wired port and a second wired port, the first wired port configured to be connected to a first network having a first security level, the second wired port configured to be connected to a second network having a second security level lower than the first security level, the network connection determining method comprising:
making network connection to at least the first wired port in accordance with setting information for connection to the second network;
determining, on a basis of a result from the making the network connection to at least the first wired port in accordance with setting information for the connection to the second network, whether the network connection to the first wired port is made properly;
making a first packet communication to the first network and the second network, the first packet communication including an address of a second device, the second device being configured to be connected to the second network; and
making a second packet communication to the first network when the first packet communication to the second network is successful and the first packet communication to the first network fails, the second packet communication including an address of a first device, the first device being configured to be connected to the first network.
11. An information processing apparatus comprising:
a first wired port that is to be connected to a first network having a first security level;
a second wired port that is to be connected to a second network having a second security level;
a storage device that holds first setting information for connection to the first network and second setting information for connection to the second network; and
a controller circuit configured to make network connection to at least the first wired port in accordance with the second setting information and determine, on a basis of a result from the network connection to at least the first wired port in accordance with the second setting information, whether the network connection to the first wired port is made properly, wherein
the first setting information includes an address of a first device to be connected to the first network,
the second setting information includes an address of a second device to be connected to the second network, and
the controller circuit is configured to:
make a first packet communication to the first network and the second network, the first packet communication including the address of the second device, and
make a second packet communication to the first network when the first packet communication to the second network is successful and the first packet communication to the first network fails, the second packet communication including the address of the first device.
1. An information processing apparatus comprising:
a first wired port that is to be connected to a first network having a first security level;
a second wired port that is to be connected to a second network having a second security level, the second security level being lower than the first security level;
a storage device that holds first setting information for connection to the first network and second setting information for connection to the second network; and
a controller circuit configured to make network connection to at least the first wired port in accordance with the second setting information and determine, on a basis of a result from the network connection to at least the first wired port in accordance with the second setting information, whether the network connection to the first wired port is made properly, wherein
the first setting information includes an address of a first device to be connected to the first network,
the second setting information includes an address of a second device to be connected to the second network, and
the controller circuit is configured to:
make a first packet communication to the first network and the second network, the first packet communication including the address of the second device, and
make a second packet communication to the first network when the first packet communication to the second network is successful and the first packet communication to the first network fails, the second packet communication including the address of the first device.
2. The information processing apparatus according to
3. The information processing apparatus according to
4. The information processing apparatus according to
5. The information processing apparatus according to
6. The information processing apparatus according to
the first network comprises a first wired local area network,
the second network comprises a second wired local area network,
the first wired local area network and the second wired local area network are separated from each other physically or logically,
the first wired port comprises a wired local area network port to which the first wired local area network is to be connected, and allows for connection of the second wired local area network in place of the first wired local area network,
the second wired port comprises a wired local area network port to which the second wired local area network is to be connected, and allows for connection of the first wired local area network in place of the second wired local area network,
the first setting information includes the address of the first device that is to be connected to the first wired local area network, and
the second setting information includes the address of the second device that is to be connected to the second wired local area network.
7. The information processing apparatus according to
the second network comprises a network that is able to be connected to the Internet, and
the first network and the second network are separated from each other physically or logically.
8. The information processing apparatus according to
the second network comprises the Internet, and
the address of the second device comprises an address of a default gateway.
10. The network connection determining method according to
the second network comprises the Internet, and
the address of the second device comprises an address of a default gateway.
12. The information processing apparatus according to
the second network comprises the Internet, and
the address of the second device comprises an address of a default gateway.
|
The present application claims priority from Japanese Patent Application No. 2019-063681 filed on Mar. 28, 2019, the entire contents of which are hereby incorporated by reference.
The technology relates to an information processing apparatus and a network connection determining method.
In recent years, the importance of network security measures is on the rise. Therefore, various security measures have been taken (see, for example, Japanese Unexamined Patent Application Publication No. 2016-177672).
In some cases, setting information for connection to a network with a high security level is leaked accidentally by human error to a network with a low security level. This case leads to a decrease in the security level of the network with the high security level.
It is desirable to provide an information processing apparatus and a network connection determining method that make it possible to avoid a risk of lowering a security level of a network with a high security level.
According to one embodiment of the technology, there is provided an information processing apparatus that includes a first port, a second port, a storage device, and a determining unit. The first port is to be connected to a first network having a first security level. The second port is to be connected to a second network having a second security level. The second security level is lower than the first security level. The storage device holds first setting information for connection to the st network and second setting information for connection to the second network. The determining unit makes network connection to at least the first port in accordance with the second setting information and determines, on the basis of a result from the network connection to at least the first port in accordance with the second setting information, whether the network connection to the first port is made properly.
According to one embodiment of the technology, there is provided a network connection determining method in an information processing apparatus that includes a first port and a second port. The first port is to be connected to a first network having a first security level. The second port is to be connected to a second network having a second security level lower than the first security level. The network connection determining method includes: making network connection to at least the first port in accordance with setting information for connection to the second network; and determining, on the basis of a result from the making the network connection to at least the first port in accordance with setting information for the connection to the second network, whether the network connection to the first port is made properly.
Hereinafter, some example embodiments of the technology will be described in detail with reference to the drawings. Note that the following description is directed to illustrative examples of the technology and not to be construed as limiting the technology. Factors including, without limitation, numerical values, shapes, materials, components, positions of the components, and how the components are coupled to each other are illustrative only and not to be construed as limiting to the technology. Further, elements in the following example embodiments which are not recited in a most-generic independent claim of the technology are optional and may be provided on an as-needed basis. The drawings are schematic and are not intended to be drawn to scale. Note that the like elements are denoted with the same reference numerals, and any redundant description thereof will not be described in detail. The description is given in the following order.
Typically, a terminal may connect only to a single network to communicate with another terminal. In some cases, however, a terminal may be required to connect simultaneously to two or more independent networks.
For example, as illustrated in
To meet the user's demand that the number of multifunction peripherals that the user is to own be as small as possible, a multifunction peripheral 600 as illustrated in
The multifunction peripheral 600 may connect to and communicate with the general LAN 100 or the classified LAN 200 separately in accordance with various settings such as the connection destination information 631 and 633 or the setting values 632 and 634 for the respective ports 610 and 620 stored in the storage device 630. Furthermore, when the multifunction peripheral 600 is to store therein data received from the general LAN 100 or the classified LAN 200, the multifunction peripheral 600 may add, for example but not limited to, a tag to each piece of the received data to distinguish each piece of the received data from another piece of the received data. This makes it possible to keep the information inside the classified LAN 200 from leaking to outside and to maintain the security of the classified LAN 200.
In such a multifunction peripheral 600, the setting values 632 and 634 may each be determined uniquely for the ports 610 and 620, respectively. As illustrated in
For example, as illustrated in
In a case where the packet Pa includes data, the data is allowed to be protected through encryption. Appropriate encryption may therefore prevent leakage of the data included in the packet Pa. It is, however, difficult to encrypt an IP address in typical encrypted communication since a router or a hub serving as a relay finds the transmission destination of the packet Pa. The third party is therefore able to find the IP address with ease by receiving only the packet Pa. Therefore, the multifunction peripheral 600 may be required to determine whether the ports 610 and 620 are not in reversed connection while keeping the security level of the classified LAN 200 from being lowered, before the multifunction peripheral 600 transmits the IP address of the server 210 connected to the classified LAN 200. An example embodiment of the technology that allows for such a determination will be described below.
[Configuration]
The classified LAN 20 and the general LAN 30 may each be a network that is able to communicate through a communication standard common to both. The classified LAN 20 and the general LAN 30 may each be a network that communicates through a communication protocol, e.g., transmission control protocol/Internet protocol (TCP/IP), used as a standard in the Internet, for example. In one example embodiment, the classified LAN 20 and the general LAN 30 may each be a network that is able to communicate through a communication standard different from each other. The classified LAN 20 and the general LAN 30 may be separated from each other physically or logically. The classified LAN 20 may not be connected to the Internet 2. Therefore, no communication may occur between the classified LAN 20 and the general LAN 30. Accordingly, the possibility that information in the classified LAN 20 leaks to the Internet 2 from the classified LAN 20 may be low, which may make the classified LAN 20 a network with a high security level. In contrast, the general LAN 30 may be connected to the Internet 2, and there is a possibility that information in the general LAN 30 leaks to the Internet 2 from the general LAN 30. Accordingly, the general LAN 30 may be a network with a security level lower than the security level of the classified LAN 20. The security level of the classified LAN 20 may correspond to a “first security level” in one specific but non-limiting embodiment of the technology. The security level of the general LAN 30 may correspond to a “second security level” in one specific but non-limiting embodiment of the technology.
As illustrated in
As illustrated in
In the setting information 13A and the setting information 13B, the security level may be expressed by a unique positive integer, for example. A smaller value may indicate a higher security level of a network. In the example embodiment, the security level of the general LAN 30 may be set to a value greater than the value for the security level of the classified LAN 20. In the setting information 13A and the setting information 13B, the network connection confirming method may indicate a technique to be used to confirm network connection. In the setting information 13A and the setting information 13B, the destination IP address for confirmation of network connection may be an IP address to be used to make a connection attempt to any desired address within a network in order to confirm the network connection. The destination IP address for confirmation of network connection in the setting information 13A may be the IP address of the server 21, for example. The destination IP address for confirmation of network connection in the setting information 13B may be the IP address of the server 31, for example. In the example embodiment, the connection to a network may be confirmed on the basis of the presence of a ping response to a specific IP address.
The network setting allocation value 13C may describe a correspondence relationship, i.e., a combination, of a port and a network. For example, as illustrated in
As illustrated in
[Operation]
Next, an example of network connection operation of the multifunction peripheral 10, i.e., the network controller 14 and the controller 15, will be described.
First, in step S110, the multifunction peripheral 10 may find a network to be connected to each port. In a specific but non-limiting example, the multifunction peripheral 10 may read out the network setting allocation value 13C stored in the storage device 13 and find that the classified LAN 20 is to be connected to the first port 11 and the general LAN 30 is to be connected to the second port 12 on the basis of the security levels in the setting information set for the respective ports.
Thereafter, the multifunction peripheral 10 may read out the information 13A and the setting information 13B from the storage device 13 on the basis of the storage locations of the respective pieces of setting information of the networks to be connected to the respective ports described in the network setting allocation value 13C. Thereafter, in step S120, the multifunction peripheral 10 may compare the security levels described in the setting information 13A and the setting information 13B and adopt the setting information, i.e., the setting information 13B, with a lower security level as the setting information for identification of the connection destination network.
Thereafter, in step S130, the multifunction peripheral 10 may confirm the connection of the network connected to the first port 11 in accordance with the network connection confirming method described in the setting information 13B, as illustrated in
Thereafter, in step S150, on the basis of the identification result 13D in the storage device 13, the multifunction peripheral 10 may determine whether the network connection to each of the first port 11 and the second port 12 is made properly. First, in step S151, on the basis of the result R1 included in the identification result 13D, the multifunction peripheral 10 may determine whether the network connection to the first port 11 is made properly, for example. In a case where it is determined, as a result, that the network connection to the first port 11 is not made properly (N in step S151), in step S152, the multifunction peripheral 10 may determine whether the network connection to the second port 12 is made properly. In a case where it is determined, as a result, that the network connection to the second port 12 is made properly (Y in step S152), this may reveal that a network different from the general LAN 30 is connected to the first port 11 and the general LAN 30 is connected to the second port 12. In other words, this may reveal that the first port 11 and the second port 12 are not in reversed connection. Therefore, in step S200 illustrated in FIG. 10, the multifunction peripheral 10 may permit communication, i.e., transmission and reception, through the general LAN 30 with the use of the setting information 13B at the second port 12.
Thereafter, in step S210, the multifunction peripheral 10 may adopt the setting information, i.e., the setting information 13A, with a higher security level as the setting information for identification of the connection destination network. Thereafter, in step S220, in accordance with the network connection confirming method described in the setting information 13A, the multifunction peripheral 10 may confirm the connection of the network connected to the port, i.e., the first port 11, for which it has been determined that the network connection has not been made properly on the basis of the setting information 13B, as illustrated in
Thereafter, in step S230, on the basis of the result R3 included in the identification result 13D, the multifunction peripheral 10 may determine whether the network connection is made properly to the port, i.e., the first port 11, for which it has been determined that the network connection has not been made properly on the basis of the setting information 13B. In a case where it is determined, as a result, that the network connection to the first port 11 is made properly (Y in step S230), this may reveal that the classified LAN 20 is connected to the first port 11. Therefore, in step S240, the multifunction peripheral 10 may permit communication, i.e., transmission and reception, through the classified LAN 20 with the use of the setting information 13A at the first port 11. At this point, it may be revealed that the classified LAN 20 is connected to the first port 11 and the general LAN 30 is connected to the second port 12. This case may mean that the networks are connected in accordance with the proper connection mode as originally expected. Therefore, the multifunction peripheral 10 may be able to communicate with each of the classified LAN 20 and the general LAN 30.
In contrast, in a case where it is determined in step S230 that the network connection to the first port 11 is not made properly (N in step S230), this may reveal that a network that is neither the general LAN 30 nor the classified LAN 20 is connected to the first port 11. In this case, the multifunction peripheral 10 may consider that the configuration of the network to be connected to the first port 11 has changed. As a result, in step S250 illustrated in
In a case where it is determined in step S152 that the network connection to the second port 12 is not made properly (N in step S152), this may indicate that the network connection has failed in both the first port 11 and the second port 12. This case may mean that a network that is not the general LAN 30 is connected to each of the first port 11 and the second port 12. Therefore, in steps S300 and S310 illustrated in
In a case where it is determined in step S151 that the network connection to the first port 11 is made properly (Y in step S151), in step S153 illustrated in
In a case where it is determined in step S153 that the network connection to the second port 12 is made properly (Y in step S153), this may reveal that the general LAN 30 is connected to both of the first port 11 and the second port 12. Therefore, in steps S500 and S510 illustrated in
[Example Effects]
Next, some example effects of the multifunction peripheral 10 and the network connection determining method in the multifunction peripheral 10 according to the example embodiment will be described.
In the example embodiment, the multifunction peripheral 10 may be provided with the two wired LAN ports, i.e., the first port 11 and the second port 12. In the multifunction peripheral 10, network connection to the first port 11 may be made in accordance with the setting information 13B. The multifunction peripheral 10 may determine, on the basis of the result from the connection, whether the network connection to the first port 11 is made properly. In this manner, improper network connection to the first port 11 may be detected not with the use of the setting information 13A to be used when connection to the classified LAN 20 with a high security level is to be made but with the use of the setting information 13B to be used when connection to the general LAN 30 with a low security level is to be made in the multifunction peripheral 10. This allows for prevention of transmitting the connection destination information of the classified LAN 20 accidentally to a network connected improperly. As a result, it is possible to avoid a risk of lowering the security level of the classified LAN 20.
Furthermore, in the example embodiment, it may be determined whether the network connection to the first port 11 is made properly, on the basis of whether a proper response to an inquiry, i.e., a ping, based on the setting information 13B is received. In this manner, improper network connection to the first port 11 may be detected not with the use of the setting information 13A to be used when connection to the classified LAN 20 with a high security level is to be made but with the use of the setting information 13B to be used when connection to the general LAN 30 with a low security level is to be made in the multifunction peripheral 10. This allows for prevention of transmitting the connection destination information of the classified LAN 20 accidentally to a network connected improperly. As a result, it is possible to avoid the risk of lowering the security level of the classified LAN 20.
Furthermore, in the example embodiment, networks may be connected to the first port 11 and the second port 12 in accordance with the setting information 13B. It may be determined, on the basis of the result from the connection, whether the network connection to the first port 11 and the second port 12 is made properly. In this manner, improper network connection to the first port 11 and the second port 12 may be detected not with the use of the setting information 13A to be used when connection to the classified LAN 20 with a high security level is to be made but with the use of the setting information 13B to be used when connection to the general LAN 30 with a low security level is to be made in the multifunction peripheral 10. This allows for prevention of transmitting the connection destination information of the classified LAN 20 accidentally to a network connected improperly. As a result, it is possible to avoid the risk of lowering the security level of the classified LAN 20.
Furthermore, in the example embodiment, in a case where networks are connected to the first port 11 and the second port 12 in accordance with the setting information 13B, it may be determined that the general LAN 30 and the classified LAN 20 are connected improperly to the first port 11 and the second port 12 when the network connection to the first port 11 is successful and the network connection to the second port 12 fails. In this manner, improper network connection to the first port 11 and the second port 12 may be detected not with the use of the setting information 13A to be used when connection to the classified LAN 20 with a high security level is to be made but with the use of the setting information 13B to be used when connection to the general LAN 30 with a low security level is to be made in the example embodiment. This allows for prevention of transmitting the connection destination information of the classified LAN 20 accidentally to a network connected improperly. As a result, it is possible to avoid the risk of lowering the security level of the classified LAN 20.
Next, some modification examples of the multifunction peripheral 10 and the network connection determining method in the multifunction peripheral 10 according to the foregoing example embodiment will be described.
In the example embodiment, the multifunction peripheral 10 may prohibit all communication, i.e., transmission and reception, in the networks connected to the first port 11 and the second port 12 in steps S300, S310, S400, and S410. Alternatively, in the example embodiment, the multifunction peripheral 10 may permit only the reception from the networks connected to the first port 11 and the second port 12 in steps S300, S310, S400, and S410. In this case, the multifunction peripheral 10 may connect to the networks connected to the first port 11 and the second port 12 with the use of the setting information 13B of the general LAN 30. In other words, in a case where an inquiry for the IP address is made by a network, the multifunction peripheral 10 may return the IP address to be used in the general LAN 30. This allows for prevention of transmitting the connection destination information of the classified LAN 20 accidentally to a network connected improperly. As a result, it is possible to avoid the risk of lowering the security level of the classified LAN 20.
In the example embodiment and the modification example described above, the multifunction peripheral 10 may include two LAN ports, and the storage device 13 may hold the setting information 13A and the setting information 13B corresponding to the respective LAN ports. Alternatively, in the example embodiment, the multifunction peripheral 10 may include three or more LAN ports, and the storage device 13 may hold three or more pieces of setting information corresponding to the respective LAN ports. In this case, in one example embodiment, the multifunction peripheral 10 may compare the security levels described in the respective pieces of setting information and adopt the setting information with the lowest security level as the setting information for identification of the connection destination network. The setting information with the lowest security level may be referred to below as “setting information A”. Furthermore, in accordance with the setting information A, the multifunction peripheral 10 may connect a network to a LAN port to which the network with the highest security level is to be connected. The LAN port to which the network with the highest security level is to be connected may be referred to below as a “LAN port α”. In one example embodiment, the multifunction peripheral 10 may determine, on the basis of the result from the connection, whether the network connection to the LAN port α is made properly. Furthermore, in one example embodiment, in step S210, the multifunction peripheral 10 may adopt the setting information, in the increasing order of the security level, as the setting information for identification of the connection destination network and confirm the connection of the network connected to the LAN port to which it has been determined that the network connection has not been made properly on the basis of the setting information A. This allows for prevention of transmitting the connection destination information of the network with the highest security level accidentally to a network connected improperly. As a result, it is possible to avoid the risk of lowering the security level of the network with the highest security level.
In the example embodiment and the modification examples described above, the multifunction peripheral 10 may determine whether the network connection is made properly, on the basis of whether the connection to the destination IP address for confirmation of the network connection included in the setting information 13B is successful. Alternatively, in the example embodiment and the modification examples described above, in a case where the network connection confirming method described in the setting information 13B indicates “packet reception”, the multifunction peripheral 10 may receive a packet inputted through the network at the first port 11 and confirm the connection destination network on the basis of the received packet in step S160, as illustrated in
Furthermore, in the example embodiment and the modification examples described above, in a case where the network connection confirming method described in the setting information 13A indicates “packet reception”, the multifunction peripheral 10 may receive a packet inputted through the network at the first port 11 and confirm the connection destination network on the basis of the received packet in step S270, as illustrated in
The multifunction peripheral 10 may extract the network address with the use of the destination IP address of the received packet and a subnet mask included in the setting information 13B, for example. Furthermore, the multifunction peripheral 10 may be able to determine whether the network connection is made properly by comparing the extracted network address and the network address portion of the IP address included in the setting information 13B, for example.
In this manner, it may be determined whether the network connection to the first port 11 is made properly, on the basis of whether the packet received at the first port 11 is a packet corresponding to the setting information 13B in the present modification example. In this manner, improper network connection to the first port 11 may be detected not with the use of the setting information 13A to be used when connection to the classified LAN 20 with a high security level is to be made but with the use of the setting information 13B to be used when connection to the general LAN 30 with a low security level is to be made in the multifunction peripheral 10. This allows for prevention of transmitting the connection destination information of the classified LAN 20 accidentally to a network connected improperly. As a result, it is possible to avoid the risk of lowering the security level of the classified LAN 20.
In the example embodiment and the modification examples described above, the setting information 13A and the setting information 13B may each include the destination IP address for confirmation of the network connection. Alternatively, in the example embodiment and the modification examples described above, the setting information 13A and the setting information 13B may each include an IP address of a domain name system (DNS) server, an IP address of a default gateway, or any other suitable IP address, for example, in place of the destination IP address for confirmation of the network connection. This allows the multifunction peripheral 10 to use the IP address of the DNS server, the IP address of the default gateway, or any other suitable IP address as an IP address to be used to make a connection attempt to any desired address within the network in order to confirm the network connection.
In the example embodiment and the modification examples described above, a general information processing apparatus such as a personal computer may be provided in place of the multifunction peripheral 10. Effects similar to those of the example embodiment and the modification examples described above are obtainable also in this case.
The series of processes described above referring to the example embodiment and the modification examples may be performed with hardware, i.e., a circuit, or software, i.e., a program. In a case where the series of processes are performed with software, the software may include a set of programs causing a computer to execute each operation. Each program may be incorporated in advance in the computer to be used or may be installed into the computer over a network or from a recording medium to be used, for example.
Furthermore, the technology encompasses any possible combination of some or all of the various embodiments and the modifications described herein and incorporated herein. It is possible to achieve at least the following configurations from the above-described example embodiments of the technology.
An information processing apparatus including:
a first port that is to be connected to a first network having a first security level;
a second port that is to be connected to a second network having a second security level, the second security level being lower than the first security level;
a storage device that holds first setting information for connection to the first network and second setting information for connection to the second network; and
a determining unit that makes network connection to at least the first port in accordance with the second setting information and determines, on the basis of a result from the network connection to at least the first port in accordance with the second setting information, whether the network connection to the first port is made properly.
The information processing apparatus according to (1), in which the determining unit determines, on the basis of whether a proper response to an inquiry based on the second setting information is received, whether the network connection to the first port is made properly.
The information processing apparatus according to (1), in which the determining unit performs confirmation of a connection destination network on the basis of a packet received at the first port and determines, on the basis of whether the connection destination network identified by the confirmation matches a network in the second setting information, whether the network connection to the first port is made properly, the connection destination network being a network to which connection is to be made.
The information processing apparatus according to (1) or (2), in which the determining unit makes network connection to the first port and the second port in accordance with the second setting information and determines, on the basis of a result from the network connection to the first port and the second port in accordance with the second setting information, whether the network connection to the first port and the second port is made properly.
The information processing apparatus according to (4), in which the determining unit determines that the first network and the second network are connected improperly to the first port and the second port in a case where the network connection to the first port is successful and the network connection to the second port fails.
A network connection determining method in an information processing apparatus that includes a first port and a second port, the first port being to be connected to a first network having a first security level, the second port being to be connected to a second network having a second security level lower than the first security level, the network connection determining method including:
making network connection to at least the first port in accordance with setting information for connection to the second network; and
determining, on the basis of a result from the making the network connection to at least the first port in accordance with setting information for the connection to the second network, whether the network connection to the first port is made properly.
According to the information processing apparatus and the network connection determining method of one embodiment of the technology, it is possible to avoid a risk of lowering a security level of a network with a high security level.
Although the technology has been described in terms of exemplary embodiments, it is not limited thereto. It should be appreciated that variations may be made in the described embodiments by persons skilled in the art without departing from the scope of the invention as defined by the following claims. The limitations in the claims are to be interpreted broadly based on the language employed in the claims and not limited to examples described in this specification or during the prosecution of the application, and the examples are to be construed as non-exclusive. For example, in this disclosure, the term “preferably”, “preferred” or the like is non-exclusive and means “preferably”, but not limited to. The use of the terms first, second, etc. do not denote any order or importance, but rather the terms first, second, etc. are used to distinguish one element from another. The term “substantially” and its variations are defined as being largely but not necessarily wholly what is specified as understood by one of ordinary skill in the art. The term “about” or “approximately” as used herein can allow for a degree of variability in a value or range. Moreover, no element or component in this disclosure is intended to be dedicated to the public regardless of whether the element or component is explicitly recited in the following claims.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
8370922, | Sep 30 2011 | Kaspersky Lab Zao | Portable security device and methods for dynamically configuring network security settings |
8683193, | Mar 01 2013 | DIGITAL THEOREM | Strict communications transport security |
20140366152, | |||
20150046588, | |||
JP2016177672, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Feb 21 2020 | OGAWA, YOHEI | Oki Data Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 052063 | /0822 | |
Mar 10 2020 | Oki Electric Industry Co., Ltd. | (assignment on the face of the patent) | / | |||
Apr 01 2021 | Oki Data Corporation | OKI ELECTRIC INDUSTRY CO , LTD | MERGER AND CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 056778 | /0785 | |
Apr 01 2021 | OKI ELECTRIC INDUSTRY CO , LTD | OKI ELECTRIC INDUSTRY CO , LTD | MERGER AND CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 056778 | /0785 |
Date | Maintenance Fee Events |
Mar 10 2020 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Jan 03 2026 | 4 years fee payment window open |
Jul 03 2026 | 6 months grace period start (w surcharge) |
Jan 03 2027 | patent expiry (for year 4) |
Jan 03 2029 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 03 2030 | 8 years fee payment window open |
Jul 03 2030 | 6 months grace period start (w surcharge) |
Jan 03 2031 | patent expiry (for year 8) |
Jan 03 2033 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 03 2034 | 12 years fee payment window open |
Jul 03 2034 | 6 months grace period start (w surcharge) |
Jan 03 2035 | patent expiry (for year 12) |
Jan 03 2037 | 2 years to revive unintentionally abandoned end. (for year 12) |